last executing test programs: 1.584689978s ago: executing program 0 (id=1): socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_clone3(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0) r4 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001c80)={&(0x7f0000000340)=@newtfilter={0x24, 0x2c, 0x800, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r5, {0x9, 0xfff3}, {0xa, 0xfff3}, {0xd, 0x10}}}, 0x24}, 0x1, 0x0, 0x0, 0x20041090}, 0x20000000) sched_setaffinity(r0, 0x8, &(0x7f00000002c0)=0x2) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) unshare(0x22020600) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') read$FUSE(r6, &(0x7f0000006b40)={0x2020}, 0x2020) 1.331021841s ago: executing program 4 (id=5): connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e22, 0x20, @loopback, 0x23}, 0x1c) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000001500)={0x1, 0x0, 0x0, &(0x7f0000001600)=""/65, 0x0, 0xeeef0000}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001840)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000280)={0x0, 0x0, 0x0, &(0x7f0000000400)=""/185, &(0x7f0000000140)=""/79, 0x9000}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000000c0)=0x1) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x1}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x1}, 0x10) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000240)=0x1) 915.444853ms ago: executing program 1 (id=2): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000340)=0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x100) shutdown(r1, 0x1) 889.607384ms ago: executing program 2 (id=3): syz_open_dev$evdev(0x0, 0x2, 0x822901) syz_open_dev$loop(&(0x7f0000000000), 0x76, 0x80) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000900)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {0x3, 0x0, 0x2}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8809}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @fccp}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x20024810}, 0x0) 763.880971ms ago: executing program 1 (id=6): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20044000}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[], 0x64}}, 0x4800) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)={0x1c, 0x3, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 763.686431ms ago: executing program 1 (id=7): capset(&(0x7f0000a31000)={0x20080522}, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/738], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffcf8}, 0x48) 660.034006ms ago: executing program 0 (id=8): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="a4000000", @ANYRES16=r1, @ANYBLOB="3f9d0000000000dcdf251700000008000300", @ANYRES32=r2, @ANYBLOB="880030800500020040000000050002001000000024000300ca78ce2ef14f35dee3659c84df2c757ee8ae4b983ec92df41dc0800594464d5614000400dfbb9be536a8431977a5a8f0d6836078240001800c00050007000000000000000c000500040000000000000005000200010000000400018014000180080001"], 0xa4}}, 0x0) 571.963531ms ago: executing program 0 (id=9): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xaece, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000002740)=""/4110, 0x100e}], 0x1, 0x49, 0x6) 491.423925ms ago: executing program 0 (id=11): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x8, 0x4}}]}}]}, 0x48}}, 0x20040084) sendmsg$nl_route_sched(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000008c0)=@newqdisc={0x8c, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r6, {0xffff}, {0xffff, 0xffff}, {0x2, 0x1}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x5c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x4, [0xc, 0x5, 0x0, 0xf, 0x10, 0x2, 0x4, 0x2, 0xf, 0x6, 0x3, 0x7, 0x8, 0x4, 0x10, 0x4], 0x3, [0xb, 0x3, 0x1, 0x2002, 0x1, 0x4, 0x2, 0xd09, 0xff05, 0x2, 0x0, 0x3, 0x5, 0x2, 0xd, 0x100], [0xfff1, 0x5, 0xffff, 0xfff5, 0x4, 0x8, 0x1, 0x9, 0x3ff, 0x2, 0xc, 0x42, 0xfffc, 0x3, 0x1]}}]}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x400dc}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=@newtfilter={0x40, 0x2c, 0xd27, 0x70bd24, 0x25dfdbfc, {0x0, 0x0, 0x0, r7, {0x4}, {}, {0x6, 0xffff}}, [@filter_kind_options=@f_matchall={{0xd}, {0xc, 0x2, [@TCA_MATCHALL_CLASSID={0x8, 0x1, {0xc, 0xfff1}}]}}]}, 0x40}, 0x1, 0x0, 0x0, 0xc858}, 0x80) 482.166375ms ago: executing program 3 (id=12): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) 399.90933ms ago: executing program 3 (id=13): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r0, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000240)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r1}, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x1c, &(0x7f0000000cc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 399.656979ms ago: executing program 4 (id=14): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000062d14406d0470084761000000010902120001000000000904"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_connect$cdc_ecm(0x3, 0x5c, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000740)={0x84, &(0x7f0000000300)={0x40, 0x5, 0x9, "d55fa5f607f0093849"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={0x40, 0x1a, 0x2, 0x2}, 0x0, 0x0, 0x0}) 399.435719ms ago: executing program 0 (id=15): sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xffffffffffffffb4, 0x0, 0x1, 0x0, 0x0, 0x41}, 0x809d) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000280)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) sendto$inet6(r1, &(0x7f00000001c0)="a6e2", 0x2, 0x4, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000000)=0x40) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="000002f0d31209000000bc2e79e995"], 0x0) write$binfmt_script(r3, &(0x7f0000000100), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x3e, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000499000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f0000000180)="66b9800000c00f326635000800000f300f0f1c9a65660ff3b20618baa000ec672e660f38803d004000000f285473f61366b9800000c00f320f300f20e06635800000000f22e02b6aa6c8", 0x4a}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20004840}, 0x14) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x2a7, 0x0, 0x0, 0x41100, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3ff}, 0x94) ioctl$KVM_RUN(r4, 0xae80, 0x0) 399.37401ms ago: executing program 1 (id=16): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e23, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, 0x0, 0x0) 396.950979ms ago: executing program 3 (id=17): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x1000000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000001c0)=@gcm_256={{0x304}, "6ae04425ace3f60c", "acba84f0a67cb12ea9a6000000000000000000000000d07e0000000000000483", "0800afb4"}, 0x38) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) writev(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)="ec", 0xfdef}], 0x11) 382.5239ms ago: executing program 1 (id=18): socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x40000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0x0) r4 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000440), &(0x7f0000000500)="14", 0x1, 0xfffffffffffffffd) keyctl$read(0xb, r4, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r5, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r5, 0x0, 0x0, 0xc054) 375.552011ms ago: executing program 3 (id=19): r0 = openat$kvm(0x0, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_kvm_setup_syzos_vm$x86(r1, &(0x7f0000c00000/0x400000)=nil) r3 = syz_kvm_add_vcpu$x86(r2, &(0x7f00000000c0)={0x0, &(0x7f0000000100)=[@enable_nested={0x12c, 0x18}], 0x18}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) mmap$KVM_VCPU(&(0x7f0000000000/0xa000)=nil, 0x930, 0x1, 0x11, r4, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x2710, 0x2, 0x9000, 0x2000, &(0x7f0000c22000/0x2000)=nil}) 183.935861ms ago: executing program 3 (id=20): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000900)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {0x3, 0x0, 0x2}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8809}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @fccp}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x20024810}, 0x0) 129.723334ms ago: executing program 3 (id=21): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$UHID_CREATE2(r0, 0x0, 0x118) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) epoll_create1(0x0) mount$9p_fd(0x0, &(0x7f0000000140)='.\x00', &(0x7f0000000180), 0x0, &(0x7f0000000100)=ANY=[@ANYRES8, @ANYRESDEC]) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prlimit64(r1, 0xc, &(0x7f0000000040)={0x2, 0xfff}, &(0x7f0000000540)) r4 = fsopen(&(0x7f00000000c0)='proc\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r5, &(0x7f0000000000)={0x1f, 0xffff, 0x3}, 0x6) r6 = fsmount(r4, 0x0, 0x0) ioctl$F2FS_IOC_DECOMPRESS_FILE(0xffffffffffffffff, 0xf517, 0x0) fchdir(r6) 0s ago: executing program 2 (id=22): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x3}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newtfilter={0x84, 0x2c, 0xd27, 0x470bd28, 0x25dfdc00, {0x0, 0x0, 0x0, r3, {0x0, 0x4}, {}, {0xfff2}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x3, 0x800000, 0xffffffffffffffff, 0x5, 0xfffffffb}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.5' (ED25519) to the list of known hosts. [ 22.361537][ T30] audit: type=1400 audit(1777345353.587:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.362700][ T273] cgroup: Unknown subsys name 'net' [ 22.390931][ T30] audit: type=1400 audit(1777345353.587:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.427794][ T30] audit: type=1400 audit(1777345353.627:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.428074][ T273] cgroup: Unknown subsys name 'devices' [ 22.577634][ T273] cgroup: Unknown subsys name 'hugetlb' [ 22.585907][ T273] cgroup: Unknown subsys name 'rlimit' [ 22.819430][ T30] audit: type=1400 audit(1777345354.047:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.832967][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.844822][ T30] audit: type=1400 audit(1777345354.047:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.881106][ T30] audit: type=1400 audit(1777345354.047:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 22.909508][ T30] audit: type=1400 audit(1777345354.087:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.941303][ T30] audit: type=1400 audit(1777345354.087:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.971756][ T30] audit: type=1400 audit(1777345354.197:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.000352][ T30] audit: type=1400 audit(1777345354.197:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.000429][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.618500][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.626298][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.635057][ T282] device bridge_slave_0 entered promiscuous mode [ 23.649418][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.657486][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.665531][ T284] device bridge_slave_0 entered promiscuous mode [ 23.675742][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.683665][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.692060][ T282] device bridge_slave_1 entered promiscuous mode [ 23.704955][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.712617][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.720664][ T284] device bridge_slave_1 entered promiscuous mode [ 23.741438][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.749116][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.758050][ T283] device bridge_slave_0 entered promiscuous mode [ 23.768508][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.776631][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.784562][ T283] device bridge_slave_1 entered promiscuous mode [ 23.823615][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.831343][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.839340][ T285] device bridge_slave_0 entered promiscuous mode [ 23.861802][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.869897][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.879126][ T285] device bridge_slave_1 entered promiscuous mode [ 23.941996][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.949760][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.958420][ T281] device bridge_slave_0 entered promiscuous mode [ 24.003682][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.011154][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.019566][ T281] device bridge_slave_1 entered promiscuous mode [ 24.060577][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.068279][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.076457][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.084279][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.101443][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.109877][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.119118][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.127708][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.154098][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.162715][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.171413][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.180749][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.242489][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.249844][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.258777][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.266009][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.279931][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.287957][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.297779][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.305522][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.314236][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.323871][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.331753][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.340059][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.348574][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.361229][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.371180][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.391158][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.402899][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.412498][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.422243][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.434597][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.443754][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.460961][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.470151][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.477724][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.486075][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.496443][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.504720][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.521403][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.529885][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.554560][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.563721][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.572610][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.581842][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.616740][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.626848][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.637105][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.645482][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.654057][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.665648][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.677049][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.687301][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.697641][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.709730][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.719629][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.728654][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.738174][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.747281][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.755896][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.764034][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.773091][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.781937][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.791181][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.800669][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.809892][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.817090][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.825268][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.834376][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.842939][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.850472][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.859120][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.867606][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.875986][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.884663][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.895023][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.904690][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.914421][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.925269][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.934131][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.942161][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.950878][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.960035][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.968524][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.985481][ T283] device veth0_vlan entered promiscuous mode [ 25.001376][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.010327][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.021884][ T283] device veth1_macvtap entered promiscuous mode [ 25.033278][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.041678][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.050548][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.059532][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.068560][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.077682][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.086967][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.102061][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.119535][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.128555][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.137911][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.147975][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.157694][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.167781][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.179402][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.189693][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.201532][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.212788][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.228203][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.238327][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.251939][ T284] device veth0_vlan entered promiscuous mode [ 25.269867][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.279219][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.287835][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.298247][ T282] device veth0_vlan entered promiscuous mode [ 25.305740][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.315109][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.324829][ T281] device veth0_vlan entered promiscuous mode [ 25.341191][ T283] request_module fs-gadgetfs succeeded, but still no fs? [ 25.342630][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.358231][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.366496][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.375738][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.392158][ T282] device veth1_macvtap entered promiscuous mode [ 25.403457][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.418364][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.429092][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.439318][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.450110][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.462034][ T284] device veth1_macvtap entered promiscuous mode [ 25.480712][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.494122][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.508043][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.519655][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.530816][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.817040][ T285] device veth0_vlan entered promiscuous mode [ 25.825988][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.835925][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.847749][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.856946][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.866929][ T281] device veth1_macvtap entered promiscuous mode [ 25.877682][ T285] device veth1_macvtap entered promiscuous mode [ 25.887115][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.897335][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.910046][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.929453][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.940289][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.951724][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.961786][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.972197][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.981909][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.991365][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.001658][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.011570][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.020766][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.036248][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.044864][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.119314][ T317] loop3: detected capacity change from 0 to 2048 [ 26.166235][ T304] loop3: p2 p3 < > p4 < p5 > [ 26.172214][ T304] loop3: partition table partially beyond EOD, truncated [ 26.200049][ T304] loop3: p2 start 53543428 is beyond EOD, truncated [ 26.209384][ T304] loop3: p3 start 4284289 is beyond EOD, truncated [ 26.225303][ T304] loop3: p5 start 53543428 is beyond EOD, truncated [ 26.234114][ T317] loop3: p2 p3 < > p4 < p5 > [ 26.239591][ T317] loop3: partition table partially beyond EOD, truncated [ 26.248945][ T317] loop3: p2 start 53543428 is beyond EOD, truncated [ 26.327147][ T317] loop3: p3 start 4284289 is beyond EOD, truncated [ 26.369337][ T317] loop3: p5 start 53543428 is beyond EOD, truncated [ 26.438101][ T331] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 26.485672][ T321] udevd[321]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 26.520754][ T321] udevd[321]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 26.810064][ T345] kvm [343]: vcpu0, guest rIP: 0x18e disabled perfctr wrmsr: 0xc1 data 0x1000000c3 [ 26.824841][ T345] kvm [343]: vcpu0, guest rIP: 0x1b8 disabled perfctr wrmsr: 0xc1 data 0x0 [ 26.836296][ T60] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 26.844865][ T345] kvm [343]: vcpu0, guest rIP: 0x18e disabled perfctr wrmsr: 0xc2 data 0xc3 [ 26.861410][ T345] kvm [343]: vcpu0, guest rIP: 0x1b8 disabled perfctr wrmsr: 0xc2 data 0x0 [ 26.932517][ T345] kvm [343]: vcpu0, guest rIP: 0x18e ignored wrmsr: 0x11e data 0x3 [ 26.944559][ T345] kvm [343]: vcpu0, guest rIP: 0x1b8 ignored wrmsr: 0x11e data 0xbe702111 [ 26.971816][ T345] kvm [343]: vcpu0, guest rIP: 0x18e disabled perfctr wrmsr: 0x186 data 0xc3 [ 26.983230][ T345] kvm [343]: vcpu0, guest rIP: 0x18e disabled perfctr wrmsr: 0x187 data 0xcf [ 27.005720][ T345] kvm [343]: vcpu0, guest rIP: 0x18e vmx_set_msr: BTF|LBR in IA32_DEBUGCTLMSR 0x53, nop [ 27.007743][ T363] ================================================================== [ 27.025527][ T363] BUG: KASAN: slab-out-of-bounds in tc_setup_flow_action+0x870/0x3240 [ 27.035572][ T363] Read of size 8 at addr ffff88810fc085c0 by task syz.2.22/363 [ 27.044289][ T363] [ 27.046906][ T363] CPU: 1 PID: 363 Comm: syz.2.22 Not tainted syzkaller #0 [ 27.054795][ T363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 27.065573][ T363] Call Trace: [ 27.069053][ T363] [ 27.072240][ T363] __dump_stack+0x21/0x30 [ 27.076907][ T363] dump_stack_lvl+0x110/0x170 [ 27.081799][ T363] ? show_regs_print_info+0x20/0x20 [ 27.088084][ T363] ? load_image+0x3e0/0x3e0 [ 27.093073][ T363] print_address_description+0x7f/0x2c0 [ 27.099480][ T363] ? tc_setup_flow_action+0x870/0x3240 [ 27.106149][ T363] kasan_report+0xf1/0x140 [ 27.111556][ T363] ? tc_setup_flow_action+0x870/0x3240 [ 27.117576][ T363] __asan_report_load8_noabort+0x14/0x20 [ 27.123420][ T363] tc_setup_flow_action+0x870/0x3240 [ 27.129363][ T363] mall_replace_hw_filter+0x2cc/0x8b0 [ 27.135484][ T363] ? pcpu_block_update_hint_alloc+0x8c4/0xc50 [ 27.143208][ T363] ? mall_set_parms+0x520/0x520 [ 27.149712][ T363] ? tcf_exts_destroy+0xb0/0xb0 [ 27.155687][ T363] ? pcpu_alloc+0x1170/0x16e0 [ 27.160966][ T363] ? mall_set_parms+0x1e8/0x520 [ 27.166474][ T363] mall_change+0x544/0x760 [ 27.173263][ T363] ? __kasan_check_write+0x14/0x20 [ 27.179697][ T363] ? mall_get+0xa0/0xa0 [ 27.185493][ T363] ? tcf_chain_tp_insert_unique+0xac1/0xc10 [ 27.193472][ T363] ? mall_get+0xa0/0xa0 [ 27.199569][ T363] tc_new_tfilter+0x142f/0x19b0 [ 27.206373][ T363] ? tcf_gate_entry_destructor+0x20/0x20 [ 27.214395][ T363] ? security_capable+0x87/0xb0 [ 27.221656][ T363] ? ns_capable+0x8c/0xf0 [ 27.228539][ T363] ? netlink_net_capable+0x125/0x160 [ 27.236002][ T363] ? tcf_gate_entry_destructor+0x20/0x20 [ 27.241989][ T363] rtnetlink_rcv_msg+0x871/0xce0 [ 27.247721][ T363] ? rtnetlink_bind+0x80/0x80 [ 27.253633][ T363] ? avc_has_perm_noaudit+0x391/0x490 [ 27.260122][ T363] ? memcpy+0x56/0x70 [ 27.264364][ T363] ? avc_has_perm_noaudit+0x30b/0x490 [ 27.270498][ T363] ? arch_stack_walk+0xee/0x140 [ 27.275963][ T363] ? avc_denied+0x1b0/0x1b0 [ 27.281270][ T363] ? stack_trace_save+0xa6/0xf0 [ 27.287363][ T363] ? avc_has_perm+0x163/0x250 [ 27.292609][ T363] ? avc_has_perm_noaudit+0x490/0x490 [ 27.298713][ T363] ? x64_sys_call+0x4b/0x9a0 [ 27.303661][ T363] ? selinux_nlmsg_lookup+0x416/0x4c0 [ 27.311413][ T363] netlink_rcv_skb+0x1f5/0x440 [ 27.317076][ T363] ? rtnetlink_bind+0x80/0x80 [ 27.322533][ T363] ? netlink_ack+0xb50/0xb50 [ 27.327609][ T363] ? __netlink_lookup+0x387/0x3b0 [ 27.333125][ T363] rtnetlink_rcv+0x1c/0x20 [ 27.337657][ T363] netlink_unicast+0x876/0xa40 [ 27.343390][ T363] netlink_sendmsg+0x879/0xb80 [ 27.349239][ T363] ? netlink_getsockopt+0x530/0x530 [ 27.355635][ T363] ? do_futex+0xde8/0x2800 [ 27.361498][ T363] ? security_socket_sendmsg+0x82/0xa0 [ 27.368671][ T363] ? netlink_getsockopt+0x530/0x530 [ 27.375135][ T363] ____sys_sendmsg+0x5b7/0x8f0 [ 27.380769][ T363] ? __sys_sendmsg_sock+0x40/0x40 [ 27.386264][ T363] ? import_iovec+0x7c/0xb0 [ 27.391757][ T363] ___sys_sendmsg+0x236/0x2e0 [ 27.397743][ T363] ? __sys_sendmsg+0x280/0x280 [ 27.403291][ T363] ? sock_show_fdinfo+0xa0/0xa0 [ 27.409163][ T363] ? __fdget+0x1a1/0x230 [ 27.414718][ T363] __x64_sys_sendmsg+0x206/0x2f0 [ 27.421382][ T363] ? ___sys_sendmsg+0x2e0/0x2e0 [ 27.427678][ T363] ? __kasan_check_write+0x14/0x20 [ 27.434995][ T363] ? switch_fpu_return+0x15d/0x2c0 [ 27.441315][ T363] x64_sys_call+0x4b/0x9a0 [ 27.446334][ T363] do_syscall_64+0x4c/0xa0 [ 27.451282][ T363] ? clear_bhb_loop+0x50/0xa0 [ 27.456724][ T363] ? clear_bhb_loop+0x50/0xa0 [ 27.462345][ T363] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 27.468656][ T363] RIP: 0033:0x7ffbc97c6dd9 [ 27.473527][ T363] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 27.496827][ T363] RSP: 002b:00007ffbc8221028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 27.506039][ T363] RAX: ffffffffffffffda RBX: 00007ffbc9a3ffa0 RCX: 00007ffbc97c6dd9 [ 27.515857][ T363] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 0000000000000004 [ 27.525121][ T363] RBP: 00007ffbc985cd69 R08: 0000000000000000 R09: 0000000000000000 [ 27.535135][ T363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 27.545896][ T363] R13: 00007ffbc9a40038 R14: 00007ffbc9a3ffa0 R15: 00007ffe64ea4048 [ 27.556316][ T363] [ 27.560115][ T363] [ 27.562894][ T363] Allocated by task 363: [ 27.569217][ T363] __kasan_kmalloc+0xda/0x110 [ 27.575827][ T363] __kmalloc+0x13d/0x2c0 [ 27.581341][ T363] tcf_idr_create+0x5f/0x790 [ 27.587469][ T363] tcf_idr_create_from_flags+0x61/0x70 [ 27.595970][ T363] tcf_gact_init+0x342/0x570 [ 27.602296][ T363] tcf_action_init_1+0x3ff/0x6b0 [ 27.608625][ T363] tcf_action_init+0x233/0x7a0 [ 27.615550][ T363] tcf_exts_validate+0x24a/0x580 [ 27.623278][ T363] mall_set_parms+0x48/0x520 [ 27.629316][ T363] mall_change+0x478/0x760 [ 27.635490][ T363] tc_new_tfilter+0x142f/0x19b0 [ 27.642331][ T363] rtnetlink_rcv_msg+0x871/0xce0 [ 27.649122][ T363] netlink_rcv_skb+0x1f5/0x440 [ 27.655440][ T363] rtnetlink_rcv+0x1c/0x20 [ 27.661541][ T363] netlink_unicast+0x876/0xa40 [ 27.666712][ T363] netlink_sendmsg+0x879/0xb80 [ 27.672656][ T363] ____sys_sendmsg+0x5b7/0x8f0 [ 27.678178][ T363] ___sys_sendmsg+0x236/0x2e0 [ 27.683403][ T363] __x64_sys_sendmsg+0x206/0x2f0 [ 27.688926][ T363] x64_sys_call+0x4b/0x9a0 [ 27.693805][ T363] do_syscall_64+0x4c/0xa0 [ 27.698699][ T363] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 27.705700][ T363] [ 27.709344][ T363] The buggy address belongs to the object at ffff88810fc08500 [ 27.709344][ T363] which belongs to the cache kmalloc-192 of size 192 [ 27.726298][ T363] The buggy address is located 0 bytes to the right of [ 27.726298][ T363] 192-byte region [ffff88810fc08500, ffff88810fc085c0) [ 27.741608][ T363] The buggy address belongs to the page: [ 27.748059][ T363] page:ffffea00043f0200 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10fc08 [ 27.758838][ T363] flags: 0x4000000000000200(slab|zone=1) [ 27.764748][ T363] raw: 4000000000000200 ffffea00043f0080 0000000600000006 ffff888100042c00 [ 27.774121][ T363] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 27.783449][ T363] page dumped because: kasan: bad access detected [ 27.790733][ T363] page_owner tracks the page as allocated [ 27.797187][ T363] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 102, ts 6326097767, free_ts 6326075529 [ 27.815827][ T363] post_alloc_hook+0x192/0x1b0 [ 27.821543][ T363] prep_new_page+0x1c/0x110 [ 27.827217][ T363] get_page_from_freelist+0x2d3a/0x2dc0 [ 27.833390][ T363] __alloc_pages+0x1a2/0x460 [ 27.838277][ T363] new_slab+0xa1/0x4d0 [ 27.842634][ T363] ___slab_alloc+0x381/0x810 [ 27.848204][ T363] __slab_alloc+0x49/0x90 [ 27.854194][ T363] kmem_cache_alloc_trace+0x146/0x270 [ 27.861430][ T363] kernfs_fop_open+0x343/0xb30 [ 27.866748][ T363] do_dentry_open+0x834/0x1010 [ 27.872747][ T363] vfs_open+0x73/0x80 [ 27.877269][ T363] path_openat+0x26a6/0x2f20 [ 27.882684][ T363] do_filp_open+0x1e2/0x410 [ 27.888140][ T363] do_sys_openat2+0x15e/0x7f0 [ 27.893186][ T363] __x64_sys_openat+0x136/0x160 [ 27.898565][ T363] x64_sys_call+0x219/0x9a0 [ 27.904261][ T363] page last free stack trace: [ 27.909584][ T363] free_unref_page_prepare+0x542/0x550 [ 27.915409][ T363] free_unref_page+0xae/0x540 [ 27.920381][ T363] __free_pages+0x6c/0x100 [ 27.925315][ T363] free_pages+0x82/0x90 [ 27.929789][ T363] selinux_genfs_get_sid+0x20b/0x250 [ 27.935716][ T363] inode_doinit_with_dentry+0x87a/0xd80 [ 27.941606][ T363] selinux_d_instantiate+0x27/0x40 [ 27.947215][ T363] security_d_instantiate+0x9e/0xf0 [ 27.953139][ T363] d_splice_alias+0x6d/0x390 [ 27.958445][ T363] kernfs_iop_lookup+0x2c2/0x310 [ 27.964895][ T363] path_openat+0xfc9/0x2f20 [ 27.970843][ T363] do_filp_open+0x1e2/0x410 [ 27.976784][ T363] do_sys_openat2+0x15e/0x7f0 [ 27.982643][ T363] __x64_sys_openat+0x136/0x160 [ 27.987682][ T363] x64_sys_call+0x219/0x9a0 [ 27.992411][ T363] do_syscall_64+0x4c/0xa0 [ 27.997554][ T363] [ 27.999973][ T363] Memory state around the buggy address: [ 28.006120][ T363] ffff88810fc08480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 28.014977][ T363] ffff88810fc08500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.024247][ T363] >ffff88810fc08580: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 28.032575][ T363] ^ [ 28.039095][ T363] ffff88810fc08600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.047621][ T363] ffff88810fc08680: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.055873][ T363] ================================================================== [ 28.064886][ T363] Disabling lock debugging due to kernel taint [ 28.071542][ T60] usb 5-1: New USB device found, idVendor=046d, idProduct=0870, bcdDevice=61.47 [ 28.459971][ T30] kauditd_printk_skb: 51 callbacks suppressed [ 28.459990][ T30] audit: type=1400 audit(1777345359.367:125): avc: denied { create } for pid=360 comm="syz.3.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 28.480627][ T60] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 28.531104][ T60] usb 5-1: config 0 descriptor?? [ 28.543114][ T30] audit: type=1400 audit(1777345359.367:126): avc: denied { bind } for pid=360 comm="syz.3.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 28.569720][ T30] audit: type=1400 audit(1777345359.797:127): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 28.600822][ T30] audit: type=1400 audit(1777345359.797:128): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 28.636366][ T30] audit: type=1400 audit(1777345359.797:129): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 28.675255][ T30] audit: type=1400 audit(1777345359.797:130): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 28.705095][ T30] audit: type=1400 audit(1777345359.797:131): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 28.730575][ T30] audit: type=1400 audit(1777345359.797:132): avc: denied { append open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 28.760470][ T30] audit: type=1400 audit(1777345359.797:133): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 30.207051][ T39] usb 5-1: USB disconnect, device number 2